CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
61.7%
fish is a command line shell. fish version 3.1.0 through version 3.3.1 is
vulnerable to arbitrary code execution. git repositories can contain
per-repository configuration that change the behavior of git, including
running arbitrary commands. When using the default configuration of fish,
changing to a directory automatically runs git
commands in order to
display information about the current repository in the prompt. If an
attacker can convince a user to change their current directory into one
controlled by the attacker, such as on a shared file system or extracted
archive, fish will run arbitrary commands under the attacker’s control.
This problem has been fixed in fish 3.4.0. Note that running git in these
directories, including using the git tab completion, remains a potential
trigger for this issue. As a workaround, remove the fish_git_prompt
function from the prompt.
github.com/fish-shell/fish-shell/commit/37625053d424c1ab88de2b0c50c7fe71e1468e2c (3.4.0)
github.com/fish-shell/fish-shell/pull/8589
github.com/fish-shell/fish-shell/releases/tag/3.4.0
github.com/fish-shell/fish-shell/security/advisories/GHSA-pj5f-6vxj-f5mq
launchpad.net/bugs/cve/CVE-2022-20001
nvd.nist.gov/vuln/detail/CVE-2022-20001
security-tracker.debian.org/tracker/CVE-2022-20001
ubuntu.com/security/notices/USN-5367-1
www.cve.org/CVERecord?id=CVE-2022-20001
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
61.7%